Cryptography for Resource Constrained Devices: A Survey
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11
Abstract
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ciphers and stream ciphers. Algorithms under both these categories are presented in this paper. Security features and performances of hardware implementations of these algorithms are also analyzed.
Authors and Affiliations
Jacob John
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
In this paper, we propose a novel approach “Routing based on Best First Search Technique (RBFS)” to improve the erformance of Dynamic Source Routing (DSR) for mobile d-hoc wireless networks. The proposed scheme tries t...
A Genetic Algorithm Optimized Decision Tree- SVM based Stock Market Trend Prediction System
Prediction of stock market trends has been an area of great interest both to researchers attempting to uncover the information hidden in the stock market data and for those who wish to profit by trading stocks. The extre...
Design and Development of Result Tool for University and College Exam and it’s Performance Study
The result system tool is designed and developed for result sheet and mark sheet preparation with various report required at University level and College level. The system is useful for the exam department of the institu...
Problem Analysis of Routing Protocols in MANET in Constrained Situation
A Mobile Ad-hoc network (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network hav...
HUNTING DOWN UNDO ISSUES WITH ORACLE: A PRACTICAL APPROACH
This article discusses the challenges in managing UNDO data and several practical approaches one might follow while analyzing and resolving UNDO issues. The most frequent UNDO error: ORA-01555 snapshot-too-old error is d...